Apply Clay security best practices for secrets and access control. Use when securing API keys, implementing least privilege access, or auditing Clay security configuration. Trigger with phrases like "clay security", "clay secrets", "secure clay", "clay API key security".
5.8
Rating
0
Installs
Security
Category
This skill provides a solid, well-structured guide to Clay API security basics including secret management, key rotation, least privilege access, and webhook verification. The description clearly communicates when to use it, and the content offers practical code examples and checklists. However, the novelty is limited—most of this content consists of standard security practices (environment variables, .gitignore, key rotation, HMAC verification) that a competent CLI agent could generate with moderate prompting. The skill is useful as a reference template and reduces some token cost for repetitive security setup tasks, but doesn't provide deeply specialized or complex Clay-specific security knowledge that would be difficult for an agent to reproduce independently.
Loading SKILL.md…